Please use this identifier to cite or link to this item:
https://er.chdtu.edu.ua/handle/ChSTU/4538
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Фауре, Еміль Віталійович | - |
dc.contributor.author | Махинько, Микола Вікторович | - |
dc.date.accessioned | 2023-09-26T11:54:52Z | - |
dc.date.available | 2023-09-26T11:54:52Z | - |
dc.date.issued | 2023 | - |
dc.identifier.isbn | 979-8-218-22315-1 | - |
dc.identifier.uri | https://er.chdtu.edu.ua/handle/ChSTU/4538 | - |
dc.description.abstract | The report highlights approaches to construct error-correcting permutation code in the context of its use in integrated data protection systems against channel errors and unauthorized access based on nonseparable factorial coding. The use of affine and projective general linear groups to form an ensemble of permutations, in addition to providing a given code distance for permutation dictionaries (arrays), allows generating network and session keys during secure data exchange. The statistical approach to construct permutation code is based on enumerating permutations and selecting those permutations, which distance does not exceed a given value to all previously selected codewords. | uk_UA |
dc.language.iso | uk | uk_UA |
dc.publisher | NGO Institute for Cyberspace Research (Detroit, Michigan, USA) | uk_UA |
dc.title | Підходи до побудови завадостійкого перестановочного коду для нероздільного факторіального кодування даних | uk_UA |
dc.type | Book chapter | uk_UA |
dc.citation.spage | 40 | uk_UA |
dc.citation.epage | 42 | uk_UA |
dc.title.book | Challenges and threats to critical infrastructure. Collective monograph | uk_UA |
Appears in Collections: | Наукові публікації викладачів (ФІТІС) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Monograph-09-06-2023-Faure1.pdf | 1.09 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.